HTB
Writeups
-
HTB Blurry writeup
[30]
<clearml/> <machine-learning/> <CVE-2024-24590/> <pickle/> <deserialization/> <python-torch/> <sudoers/>
-
HTB Freelancer writeup
[40]
<forgot-password/> <idor/> <qrcode/> <mssql/> <xp_cmdshell/> <sql-configuration/> <crash-dump-analysis/> <active-directory-acls/> <genericwrite/> <nt-hashes/> <secretsdump/>
-
HTB Boardlight writeup
[20]
<dolibarr/> <CVE-2023-30253/> <subdomain-enumeration/> <crm/> <erp/> <php-injection/> <php-configuration/> <mysql/> <password-reuse/> <suid/> <enlightenment/> <CVE-2022-37706/>
-
HTB Solarlab writeup
[30]
<smb/> <spreadsheet/> <libreoffice/> <bruteforcing-web/> <rce/> <CVE-2023-33733/> <pdf/> <openfire-exploit/> <CVE-2023-32315/> <openfire-database/> <decrypt-password/> <java/>
-
HTB Intuition writeup
[40]
<xss/> <cookie-hijacking/> <cve-2023-24329/> <urllib/> <ssrf/> <ssrf-to-lfi/> <url-wrappers/> <ftp/> <ssh-key/> <ssh-key-comments/> <sqlite/> <hash-cracking/> <binary-analysis/> <suricata-logs/> <sudoers/> <ghidra/> <command-execution/>
-
HTB Mailing writeup
[20]
<lfi/> <hMailServer/> <hMailServer-configuration/> <hash-cracking/> <outlook-vulnerabilities/> <CVE-2024-21413/> <ntlm-hash/> <libreoffice-odt-exploit/> <CVE-2023-2255/>
-
HTB Skyfall writeup
[50]
<forbidden-bypass/> <minio-cloud/> <minio-cve/> <CVE-2023-28432/> <hashicorp-vault/> <vault-ssh/> <sudoers/> <vault-unseal/> <race-condition/>
-
HTB Runner writeup
[30]
<teamcity/> <cve-2023-42793/> <teamcity-api/> <teamcity-rce/> <hsql/> <bcrypt/> <hash-cracking/> <id_rsa/> <portainer/>
-
HTB FormulaX writeup
[40]
<xss/> <websocket/> <simple-git-cve/> <CVE-2022-24066/> <mongodb/> <hash-cracking/> <librenms/> <librenms-abuse-template/> <laravel-blade/> <php/> <env-creds/> <sudoers/> <libreoffice-server-abuse/> <apache-uno-api/>
-
HTB Usage writeup
[20]
<sql-injection/> <boolean-based-sql-injection/> <hash-cracking/> <upload-vulnerabilities/> <monit/> <sudoers/> <abuse-symlinks/> <zip/>
-
HTB Corporate writeup
[50]
<xss/> <bypass-csp/> <cookie-hijacking/> <idor/> <vpn/> <password-spraying/> <.mozilla-enumeration/> <bruteforce-bitwarden-pin/> <source-code-analysis/> <cookie-forging/> <jwt/> <docker-privesc/> <abupve/>
-
HTB Jab writeup
[30]
<xmpp/> <xmpp-user-enumeration/> <asreproast/> <hash-cracking/> <executedcom/> <dcomexec.py/> <openfire-rce/> <CVE-2023-32315/>
-
HTB Office writeup
[40]
<joomla-information-disclosure/> <CVE-2023-23752/> <smb-enumeration/> <pcap-tcp-packet-analysis/> <wireshark/> <krb-hash/> <joomla-rce/> <runascs/> <password-reuse/> <port-forwading/> <libreoffice-odt-exploitation/> <CVE-2023-2255/> <dpapi-creds/> <mimikatz/> <bloodhound/> <modifying-group-policy/>
-
HTB Crafty writeup
[20]
<minecraft/> <log4j/> <jdgui/> <analyzing-jar/> <minecraft-plugins/>
-
HTB Pov Writeup
[30]
<lfi/> <web.config/> <deserialization/> <exploiting-viewstate/> <decrypting-securestring/> <sedebugprivilege/>
-
HTB Analysis Writeup
[40]
<fuzzing/> <ldap-injection/> <php-shell/> <upload-vulnerabilities/> <autologon/> <dll-injection/>
-
HTB Bizness Writeup
[20]
<apache_ofbiz/> <CVE-2023-51467/> <CVE-2023-49070/> <hash_cracking/> <hash_salt/> <su/>
-
HTB Ouija Writeup
[50]
<fuzzing/> <html_inspection/> <information_leakage/> <haproxy/> <http_request_smuggling/> <CVE-2021-40346/> <source_code_inspection/> <hash_extension_attack/> <lfi/> <proc_files/> <php_plugin/> <integer_overflow/> <buffer_overflow/> <webshell/>
-
HTB Monitored Writeup
[40]
<udp/> <snmp/> <nagiosxi/> <api/> <nagios_rce/> <sudoers/> <abusing_nagios_scripts/>
-
HTB Napper Writeup
[40]
<information_disclosure/> <abusing_backdoor/> <naplistener/> <elasticsearch/> <reverse_engineering/> <go_reverse_engineering/> <decryption_with_AES/> <runascs/>
-
HTB Devvortex Writeup
[20]
<joomla/> <CVE-2023-23752/> <information_leakage/> <password_reuse/> <joomla_rce/> <database_enumeration/> <hash_cracking/> <ssh/> <sudoers/> <apport-cli/> <CVE-2023-1326/>
-
HTB Hospital Writeup
[30]
<webshell_upload/> <kernel_exploits/> <hash_cracking/> <pivoting/> <phishing/> <ghostscript_rce/>
-
HTB Codify Writeup
[20]
<nodejs/> <rce/> <sqlite3/> <hashes/> <sudoers/> <bash-bruteforcing/>